CyberSecurity updates
Updated: 2024-11-21 19:45:55 Pacfic

jiska (noreply@blogger.com) @
Impact of iOS 18 Inactivity Reboot on Security - 3d

This news discusses the security implications of iOS 18’s inactivity reboot feature. The automatic reboot after 72 hours of inactivity is intended to enhance security by mitigating the risk of unauthorized access, data theft, and other cyber threats. This feature aligns with U.S. NSA security recommendations, reducing the window of opportunity for malicious actors to exploit inactive devices.

blog.pypi.org
PyPI Digital Attestations: Enhancing Python Supply Chain Security - 4d

A new feature called digital attestations has been released on PyPI, the Python Package Index, to bolster supply chain security for Python packages. These attestations essentially function as digital signatures, cryptographically linking packages published on PyPI to the specific source code used for their creation, thus offering stronger assurance that packages downloaded from PyPI haven’t been tampered with or injected with malicious code. This feature utilizes a mechanism that proves a trustworthy build system was used to generate and publish the package, starting with its source code on GitHub. This development significantly enhances the reliability and trust in Python package distribution by providing concrete evidence of package origin and authenticity, mitigating risks associated with malware injection or tampering within the Python ecosystem. While this feature is already available to those using the PyPI Trusted Publishers mechanism in GitHub Actions, a new API has been introduced for consumers and installers to verify published attestations, allowing for broader adoption and increased confidence in package provenance across the Python community.

Rob Thubron @ TechSpot
New AI-Powered “Granny” Tool Designed to Waste Scammers’ Time - 7d

O2, a telecommunications company, has launched an AI-powered tool named “Daisy” designed to combat phone scams. Daisy simulates a real-life grandmother who engages scammers in lengthy, meandering conversations, wasting their time and potentially disrupting their operations. The tool is powered by AI and trained on a vast dataset of real-world interactions with scammers, enabling Daisy to respond realistically and effectively. By engaging scammers in lengthy conversations, Daisy aims to deter them from targeting potential victims and disrupting their efforts. This innovative approach to combating scams leverages AI to provide a valuable service to consumers.

malwarebytes.com
DNA Testing Company Vanishes, Leaving Customer Genetic Data in Limbo - 9d

Atlas Biomed, a DNA testing company that promised clients insights into their genetic disposition, has suddenly vanished, leaving customers concerned about the fate of their sensitive data. The company’s offices are closed, phone lines are unanswered, and online records are inaccessible. While there’s no evidence of data misuse, the lack of information about who now possesses the genetic data raises alarm bells. The investigation reveals potential ties to Russia, with two of the remaining company officers residing at the same address in Moscow as a Russian billionaire, who was previously a director. The incident highlights the growing concern about the security of genetic data and the need for due diligence when selecting DNA testing companies. It also underscores the risks associated with sharing such sensitive information, especially when considering the potential commercialization and potential for exploitation.

jpmellojr@gmail.com (John P. Mello Jr.) @ ReversingLabs Blog
OWASP LLM Security Guidance: Deepfakes and AI Security Centers of Excellence - 9d

The OWASP (Open Web Application Security Project) has released new security guidance for organizations running generative AI tools. The updated OWASP Top 10 for LLM focuses on addressing the growing threat of deepfakes, providing recommendations for risk assessment, threat actor identification, incident response, awareness training, and various event types. Additionally, the guidance advocates for establishing centers of excellence for gen AI security to develop security policies, foster collaboration, build trust, advance ethical practices, and optimize AI performance. This new guidance highlights the increasing need for a more comprehensive approach to securing AI and machine-learning tools, as attackers leverage AI to create more sophisticated and advanced threats.

justice.gov
US Gov’t Sentences Bitfinex Hacker for Laundering Billions - 6d

Ilya Lichtenstein, the individual behind the 2016 Bitfinex cryptocurrency exchange hack, was sentenced to five years in prison for money laundering by the US Department of Justice. Lichtenstein and his wife, Heather Morgan, stole over 119,000 Bitcoin, worth approximately $10.5 billion at the time of the theft. The stolen cryptocurrency was laundered through a complex network of transactions, using various techniques to obfuscate the origins of the funds. The investigation by the DOJ involved tracing the movement of the stolen Bitcoin through various exchanges and wallets, ultimately recovering a substantial portion of the stolen assets. This case highlights the evolving tactics of cybercriminals and the need for improved security measures within the cryptocurrency industry.

x.com
Okta Authorization Bypass Vulnerability - 19d

Okta, a prominent identity and access management provider, has been found to be vulnerable to an authorization bypass flaw. This vulnerability, which has been patched, allows attackers to gain unauthorized access to restricted resources, potentially compromising sensitive user data. The vulnerability stems from Okta’s AD/LDAP delegated authentication mechanism, which allows users to authenticate with a username longer than 52 characters. Attackers could exploit this by crafting specially designed usernames, effectively bypassing authentication checks and gaining access to resources without proper authorization. This incident highlights the importance of robust security practices, including thorough vulnerability assessments and timely patching of identified flaws.

Liam Dawe @ GamingOnLinux Latest Articles
Security Concerns Related to Kernel-Level Anti-Cheat in Steam Games - 19d

The latest update to the Steam platform requires game developers to disclose kernel-level anti-cheat usage on their store pages. This transparency measure is meant to enhance user awareness and potentially improve the security of the gaming environment. Kernel-level anti-cheat software runs at a privileged level, making it more powerful but also posing a greater security risk as it has deeper access to the system. This new disclosure policy will enable users to make more informed decisions about which games they purchase and play on Steam. It is important for gamers to consider the security implications of kernel-level anti-cheat and potentially avoid games using such software, especially on platforms like Steam Deck or desktop Linux. While anti-cheat software aims to prevent cheating and promote fair play, its reliance on kernel access introduces complexities and potential security vulnerabilities.

jpmellojr@gmail.com (John P. Mello Jr.) @ ReversingLabs Blog
Automated Moving Target Defense (MTD) and its Implementation - 12d

Automated Moving Target Defense (MTD) is a cybersecurity strategy that aims to thwart attackers by continuously altering the attack surface. This approach, inspired by military tactics, makes it difficult for attackers to exploit vulnerabilities and move laterally within a network. While the concept has been around for over two decades, its widespread adoption remains limited. The challenges include the complexity of implementation, the emphasis on prevention rather than detection, and potential implementation failures. This article delves into the reasons behind MTD’s slow adoption and explores its potential impact on cybersecurity.

ciso2ciso.com
Critical Vulnerability in Ivanti Cloud Service Appliance Actively Exploited - 6d

A critical vulnerability in Ivanti’s Cloud Service Appliance (CSA) has been actively exploited by attackers. The flaw, tracked as CVE-2024-8190, allows attackers to gain unauthorized access to sensitive data and execute arbitrary commands on vulnerable systems. The vulnerability exists in the CSA’s authentication mechanism and can be exploited by attackers who can send specially crafted requests to the CSA. This attack vector allows attackers to bypass the CSA’s security measures and gain access to the underlying operating system. The vulnerability has been exploited in the wild by a suspected nation-state adversary. There are strong indications that China is behind the attacks. Organizations using Ivanti CSA should prioritize patching the vulnerability immediately to reduce their risk of being compromised.


This site is an experimental news aggregator using feeds I personally follow. You can reach me at Bluesky if you have feedback or comments.